| Название | Tenda RX3 V16.03.13.11 Stack-based Buffer Overflow |
|---|
| Описание | During a security review of the Tenda RX3 router firmware (version V16.03.13.11), a critical buffer overflow vulnerability was identified in the Wi-Fi schedule configuration endpoint /goform/openSchedWifi.
The vulnerability exists within the setSchedWifi function. This function retrieves user-controlled parameters schedStartTime and schedEndTime via the websGetVar interface. These values are subsequently copied into a heap-allocated buffer of fixed size (25 bytes) using the unsafe strcpy function. Since there is no length validation on the input, an attacker can provide an oversized string to overflow the buffer, leading to memory corruption, Denial of Service (DoS), or potential arbitrary code execution. |
|---|
| Источник | ⚠️ https://github.com/LX-66-LX/cve-new/issues/5 |
|---|
| Пользователь | LX-66-LX (UID 92717) |
|---|
| Представление | 31.01.2026 11:05 (3 месяцы назад) |
|---|
| Модерация | 07.02.2026 16:19 (7 days later) |
|---|
| Статус | принято |
|---|
| Запись VulDB | 344884 [Tenda RX3 16.03.13.11 /goform/openSchedWifi schedStartTime/schedEndTime повреждение памяти] |
|---|
| Баллы | 20 |
|---|